/freebsd-11-stable/crypto/openssl/ssl/ |
H A D | s23_clnt.c | 266 SSL_CIPHER *cipher; local 271 cipher = sk_SSL_CIPHER_value(ciphers, i); 272 if (cipher->algorithm_ssl == SSL_SSLV2)
|
H A D | s2_clnt.c | 477 * (highest priority) cipher the server sends, otherwise 503 s->session->cipher = sk_SSL_CIPHER_value(prio, i); 539 /* CIPHER **cipher;*/ 566 s2n(n, p); /* cipher spec num bytes */ 620 i = ssl_put_cipher_by_char(s, sess->cipher, p); 650 if (sess->cipher->algorithm2 & SSL2_CF_8_BYTE_ENC) 652 else if (SSL_C_IS_EXPORT(sess->cipher))
|
H A D | s3_enc.c | 474 if (s->session->cipher != NULL) { 475 if (s->session->cipher->algorithm_enc == SSL_eNULL) 479 if (s->session->cipher->algorithm_enc == SSL_RC4) 541 bs = EVP_CIPHER_block_size(ds->cipher);
|
H A D | kssl.c | 1261 asn1ticket->encdata->cipher->length; 1263 calloc(1, asn1ticket->encdata->cipher->length)) == NULL) { 1266 "Error allocating cipher in krb5ticket.\n"); 1271 asn1ticket->encdata->cipher->data, 1272 asn1ticket->encdata->cipher->length); 2105 outl = dec_authent->cipher->length; 2107 (&ciph_ctx, unenc_authent, dec_authent->cipher->data, outl)) {
|
H A D | s2_srvr.c | 410 s->session->cipher = cp; 463 is_export = SSL_C_IS_EXPORT(s->session->cipher); 475 * 3 bytes cipher 483 * If the cipher is an export cipher, then the encrypted key bytes 485 * this portion is in |num_encrypted_key_bytes|. If the cipher is not an 486 * export cipher, then the entire key material is encrypted (i.e., clear 496 if (s->session->cipher->algorithm2 & SSL2_CF_8_BYTE_ENC) { 637 * get session-id before cipher stuff so we can get out session structure 707 /* Make sure we have at least one cipher i [all...] |
/freebsd-11-stable/contrib/wpa/src/drivers/ |
H A D | driver_atheros.c | 315 wpa_printf(MSG_ERROR, "Unknown group key cipher %u", 319 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v); 321 wpa_printf(MSG_INFO, "Unable to set group key cipher to %u", v); 507 u_int8_t cipher; local 518 cipher = IEEE80211_CIPHER_WEP; 521 cipher = IEEE80211_CIPHER_TKIP; 524 cipher = IEEE80211_CIPHER_AES_CCM; 528 cipher = IEEE80211_CIPHER_AES_CCM_256; 531 cipher = IEEE80211_CIPHER_AES_GCM; 534 cipher [all...] |
/freebsd-11-stable/sys/dev/cxgbe/crypto/ |
H A D | t4_crypto.c | 105 * For block cipher replies, the updated IV is supplied in data[2] and 188 * 'sg_dsgl' is used to describe the destination that cipher 793 * before the cipher/plain text, not after. This is true of 816 * The output buffer consists of the cipher text followed by 865 * cipher/plain text. For decryption requests the hash is 866 * appended after the cipher text. 916 * Any auth-only data before the cipher region is marked as AAD. 917 * Auth-data that overlaps with the cipher region is placed in 1095 * For encryption requests, crd should be the cipher request 1137 * AAD is only permitted before the cipher/plai 1883 struct cryptoini *c, *hash, *cipher; local [all...] |
/freebsd-11-stable/crypto/heimdal/lib/krb5/ |
H A D | get_for_creds.c | 412 cred.enc_part.cipher.data = buf; 413 cred.enc_part.cipher.length = buf_size;
|
/freebsd-11-stable/crypto/openssl/crypto/pkcs7/ |
H A D | pk7_smime.c | 139 /* Check to see if a cipher exists and if so add S/MIME capabilities */ 481 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, 495 if (!PKCS7_set_cipher(p7, cipher)) {
|
/freebsd-11-stable/crypto/openssl/crypto/evp/ |
H A D | e_des3.c | 281 int mode = ctx->cipher->flags & EVP_CIPH_MODE; 331 int mode = ctx->cipher->flags & EVP_CIPH_MODE;
|
H A D | e_des.c | 236 int mode = ctx->cipher->flags & EVP_CIPH_MODE;
|
/freebsd-11-stable/usr.sbin/ppp/ |
H A D | chap_ms.c | 112 DesEncrypt(u_char *clear, u_char *key, u_char *cipher) argument 119 des_ecb_encrypt((des_cblock *)clear, (des_cblock *)cipher, key_schedule, 1);
|
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | tls_openssl.c | 1102 "OpenSSL: Failed to set cipher string '%s'", 1327 return "change cipher spec"; 1408 * Parse ServerHello to get the selected cipher suite since OpenSSL does 1438 wpa_printf(MSG_DEBUG, "OpenSSL: Server selected cipher suite 0x%x", 1519 * length since OpenSSL does not expose the new cipher suite and DH 3117 * cipher suites for EAP-TEAP. 3123 "OpenSSL: Enable cipher suites for anonymous EAP-TEAP provisioning: %s", 3990 if (ssl->enc_read_ctx == NULL || ssl->enc_read_ctx->cipher == NULL || 3994 c = ssl->enc_read_ctx->cipher; 4011 int cipher, diges 5128 const char *cipher; local 5333 tls_sess_sec_cb(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, const SSL_CIPHER **cipher, void *arg) argument 5540 const SSL_CIPHER *cipher; local [all...] |
H A D | crypto_linux.c | 784 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, argument 801 io[0].iov_base = (void *) (cipher + iv_len); 824 os_memcpy(alg_iv->iv, cipher, iv_len);
|
/freebsd-11-stable/tools/regression/net80211/ccmp/ |
H A D | test_ccmp.c | 526 #define TEST(n,name,cipher,keyix,pn) { \ 527 name, IEEE80211_CIPHER_##cipher,keyix, pn##LL, \ 535 int cipher; member in struct:ciphertest 610 if (!ieee80211_crypto_newkey(vap, t->cipher,
|
/freebsd-11-stable/crypto/openssl/crypto/cms/ |
H A D | cms_env.c | 156 CMS_ContentInfo *CMS_EnvelopedData_create(const EVP_CIPHER *cipher) argument 167 cipher, NULL, 0)) 940 /* If error or no cipher end of processing */ 942 if (!ret || !ec->cipher) 962 ec->cipher = NULL;
|
H A D | cms_pwri.c | 110 kekciph = env->encryptedContentInfo->cipher; 122 /* Setup algorithm identifier for cipher */ 367 /* Fixup cipher based on AlgorithmIdentifier to set IV etc */
|
/freebsd-11-stable/crypto/openssl/apps/ |
H A D | req.c | 185 const EVP_CIPHER *cipher = NULL; local 203 cipher = EVP_des_ede3_cbc(); 708 cipher = NULL; 710 cipher = NULL; 714 if (!PEM_write_bio_PrivateKey(out, pkey, cipher,
|
/freebsd-11-stable/contrib/unbound/util/ |
H A D | net_help.c | 96 * @param evp_ctx: the evp cipher context, function sets this. 948 /* if we have sha256, set the cipher list to have no known vulns */ 950 log_crypto_err("could not set cipher list with SSL_CTX_set_cipher_list"); 1477 const EVP_CIPHER *cipher; variable 1482 cipher = EVP_aes_256_cbc(); 1483 evp_cipher_length = EVP_CIPHER_iv_length(cipher); 1492 if (EVP_EncryptInit_ex(evp_sctx, cipher, NULL, ticket_keys->aes_key, iv) != 1) { 1550 if (EVP_DecryptInit_ex(evp_sctx, cipher, NULL, key->aes_key, iv) != 1) {
|
/freebsd-11-stable/crypto/openssl/engines/ccgost/ |
H A D | gost_crypt.c | 6 * OpenSSL interface to GOST 28147-89 cipher functions * 34 /* set/get cipher parameters */ 166 /* Sets cipher param from paramset NID. */ 303 * block cipher current iv 318 /* Next iv is next block of cipher text */ 362 * block cipher current iv 397 /* Control function for gost cipher */ 426 /* Set cipher parameters from ASN1 structure */ 439 if (!ASN1_OCTET_STRING_set(gcp->iv, ctx->iv, ctx->cipher->iv_len)) { 488 if (len != ctx->cipher [all...] |
/freebsd-11-stable/contrib/netbsd-tests/crypto/opencrypto/ |
H A D | h_aesctr1.c | 220 cs.cipher = CRYPTO_AES_CTR;
|
/freebsd-11-stable/contrib/wpa/src/tls/ |
H A D | tlsv1_record.c | 20 * tlsv1_record_set_cipher_suite - TLS record layer: Set cipher suite 22 * @cipher_suite: New cipher suite 25 * This function is used to prepare TLS record layer for cipher suite change. 36 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x", 55 data = tls_get_cipher_data(suite->cipher); 68 * tlsv1_record_change_write_cipher - TLS record layer: Change write cipher 70 * Returns: 0 on success (cipher changed), -1 on failure 72 * This function changes TLS record layer to use the new cipher suite 77 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite " 92 "cipher"); [all...] |
/freebsd-11-stable/contrib/wpa/src/eap_server/ |
H A D | eap_server_fast.c | 445 wpa_printf(MSG_INFO, "EAP-FAST: Failed to set TLS cipher " 551 char cipher[64]; local 555 if (tls_get_cipher(sm->ssl_ctx, data->ssl.conn, cipher, sizeof(cipher)) 557 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to get cipher " 562 data->anon_provisioning = os_strstr(cipher, "ADH") != NULL;
|
/freebsd-11-stable/crypto/openssl/crypto/threads/ |
H A D | mttest.c | 130 static char *cipher = NULL; variable 259 if (cipher == NULL && OPENSSL_issetugid() == 0) 260 cipher = getenv("SSL_CIPHER");
|
/freebsd-11-stable/contrib/wpa/wpa_supplicant/ |
H A D | wpas_glue.c | 236 int cipher = (keylen == 5) ? WPA_CIPHER_WEP40 : local 239 wpa_s->pairwise_cipher = cipher; 241 wpa_s->group_cipher = cipher;
|